Roaming Mantis  (Back to overview)

aka: Roaming Mantis Group

According to new research by Kaspersky's GReAT team, the online criminal activities of the Roaming Mantis Group have continued to evolve since they were first discovered in April 2018. As part of their activities, this group hacks into exploitable routers and changes their DNS configuration. This allows the attackers to redirect the router user's traffic to malicious Android apps disguised as Facebook and Chrome or to Apple phishing pages that were used to steal Apple ID credentials. Recently, Kaspersky has discovered that this group is testing a new monetization scheme by redirecting iOS users to pages that contain the Coinhive in-browser mining script rather than the normal Apple phishing page. When users are redirected to these pages, they will be shown a blank page in the browser, but their CPU utilization will jump to 90% or higher.

Associated Families

There are currently no families associated with this actor.

2018-10-01Bleeping ComputerLawrence Abrams
Roaming Mantis Group Testing Coinhive Miner Redirects on iPhones
Roaming Mantis

Credits: MISP Project